SPIN-UMass / DeepCorrView external linksLinks
☆34Oct 10, 2018Updated 7 years ago
Alternatives and similar repositories for DeepCorr
Users that are interested in DeepCorr are comparing it to the libraries listed below
Sorting:
- ☆28Jun 24, 2022Updated 3 years ago
- A replicated implementation of the article 'DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning' in Tensorflow 2.3.☆12Jan 2, 2021Updated 5 years ago
- ☆28May 6, 2021Updated 4 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆20Jul 6, 2024Updated last year
- Surakav Implementation☆18May 14, 2024Updated last year
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆55Dec 31, 2021Updated 4 years ago
- ☆26Sep 20, 2023Updated 2 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆37Oct 2, 2020Updated 5 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆196Mar 25, 2023Updated 2 years ago
- 2018年国际AIOps挑战赛KPI时序异常检测比赛基于OpenMLDB部署的工程化部署实践方案☆12Aug 30, 2022Updated 3 years ago
- ☆18Sep 8, 2025Updated 5 months ago
- ☆24Mar 11, 2022Updated 3 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆111Oct 9, 2023Updated 2 years ago
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- 🔐 A list of anonymity papers published from 2012 to 2025.☆17Nov 26, 2025Updated 2 months ago
- Hunting for Sybils and anomalies in archived Tor network data.☆43Mar 26, 2019Updated 6 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- Self-attentive deep learning method for online traffic classification and its interpretability (CN21 & NetAI20)☆40Jun 27, 2024Updated last year
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆48Aug 10, 2020Updated 5 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- 用于检测网站是否使用了CDN机制。☆20Sep 19, 2020Updated 5 years ago
- Network traffic classifier based on machine learning algorithms☆48Jul 16, 2022Updated 3 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Oct 21, 2019Updated 6 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- ☆19Oct 11, 2021Updated 4 years ago
- Code for our submission to IEEE CNS 2022☆24Oct 10, 2023Updated 2 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆49Nov 13, 2020Updated 5 years ago
- Implementation of "Website Fingerprinting at Internet Scale"☆23Feb 24, 2023Updated 2 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Mar 16, 2016Updated 9 years ago
- SSH traffic analysis☆23Apr 16, 2019Updated 6 years ago
- Tor, I2P, ZeroNet, Freenet traffic data☆32Oct 9, 2021Updated 4 years ago